English   Deutsch   Русский   中文    

Information

Language:
English
Date:
May 05 - 08, 2015
Location:

Dolce BallhausForum
Andreas-Danzer-Weg 1
85716 Unterschleißheim, Munich
Registration fee:
€1490.00
plus 19% VAT
€  $ 






Workshops

FIDO Alliance Update

04.05.2015 14:00-18:00

The FIDO Alliance Update Seminar will provide an understanding of where the FIDO Alliance stands in its effort to address online authentication problems — problems best exemplified by the weakness of passwords! Recent announcements by companies including Google and Microsoft have demonstrated that the FIDO Standards are becoming the way to address authentication.

More information

   

OpenID Foundation Workshop

05.05.2015 09:00-13:00

OpenID Foundation This OpenID Foundation Workshop provides early insight and influence on important new online identity standards like the EIC Award-winning OpenID Connect. We will provide updates on the OpenID Connect Self Certification Test Suite and Mobile Profile Working Groups of OpenID Connect as well as other protocols in the pipeline like Account Chooser and Native Applications. Leading technology experts from Microsoft, Google, Ping Identity and others will update developments with these key protocols, review work group progress and discuss how they help meet enterprise business challenges.

More information

 

The Foundations of API Security and API Gateway Technology

05.05.2015 09:00-13:00

Forum Systems This workshop will explore API gateway technology. What it is, how it’s applied today, the benefits of API gateway technology, and implementation examples.

More information

   

Kantara Workshop

05.05.2015 09:00-13:00

Kantara Initiative The Kantara Initiative annual EIC workshop will focus on the Kantara Initiative strategy for Connected Life & Access Management 2.0. Organizations of all types are faced with permanent change - in technology, markets, business models, and regulation. This continuously changing environment applies for organizations big and small, as well as local and global. Services that leverage identity and personal data are becoming pervasive and the identity data of people, organisations, applications and devices represents a user’s digital DNA.

More information

 

Contextual Security Intelligence

05.05.2015 09:00-13:00

BalaBit IT Security Behaviour-based approaches to detecting intrusions have recently gained importance and momentum as a complementary model to the purely knowledge based approach. Behavioural intrusion detection is based on the assumption, that intrusions regularly create deviations from the normal behaviour, which is defined by reference models. In permanently comparing network activity with the reference model, such deviations can be detected and used to create an alarm.

More information

   

© 2015 KuppingerCole